[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

US20070101403A1 - Provisioning a wireless link for a wireless scanner - Google Patents

Provisioning a wireless link for a wireless scanner Download PDF

Info

Publication number
US20070101403A1
US20070101403A1 US11/266,828 US26682805A US2007101403A1 US 20070101403 A1 US20070101403 A1 US 20070101403A1 US 26682805 A US26682805 A US 26682805A US 2007101403 A1 US2007101403 A1 US 2007101403A1
Authority
US
United States
Prior art keywords
security data
wireless device
wireless
provisioning
display device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/266,828
Inventor
Joseph Kubler
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intermec IP Corp
Original Assignee
Intermec IP Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intermec IP Corp filed Critical Intermec IP Corp
Priority to US11/266,828 priority Critical patent/US20070101403A1/en
Assigned to INTERMEC IP CORP. reassignment INTERMEC IP CORP. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KUBLER, JOSEPH J.
Publication of US20070101403A1 publication Critical patent/US20070101403A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10544Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
    • G06K7/10821Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices
    • G06K7/1093Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices sensing, after transfer of the image of the data-field to an intermediate store, e.g. storage with cathode ray tube
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Definitions

  • the present invention relates to wireless scanning devices, and more particularly, to a system or method of provisioning a wireless link for a wireless scanner by automatically generating security data at the beginning of a session, providing security data to an output device, scanning the security data, and using the security data to establish a (preferably secure) wireless connection between the wireless scanner and a host.
  • Wireless technology is becoming more and more prevalent.
  • One concern with wireless technology is the security of the information that is being transmitted. This is because the information is being transmitted over radio frequency (RF) signals that are accessible to anyone with a proper reception device.
  • RF radio frequency
  • many wireless protocols e.g., Bluetooth, ZigBee, WLAN, etc.
  • Bluetooth, ZigBee, WLAN, etc. have implemented security procedures that can be activated on command.
  • Bluetooth uses a personal identification number (PIN) to authenticate a secondary device.
  • PIN personal identification number
  • the PIN of a primary device is manually provided to the secondary device (e.g., by way of a keyboard).
  • the primary device then transmits a “challenge” that is based (in part) on the PIN.
  • the secondary device transmits a “response” that is based (in part) on the “challenge” and the PIN. If the “response” is proper (or authenticated), the secondary device is authenticated, and a relatively secure wireless link is established.
  • the PIN can be used to generate an encryption key, which is used to encrypt (or encode) data that is transmitted over the link. Similar security procedures are found in other wireless protocols.
  • the present invention provides a system and method of provisioning a wireless link for a wireless scanner.
  • Embodiments of the present invention operate in accordance a primary wireless device (e.g., a host) adapted to generate security data at the beginning of a session, an output device (e.g., a display, printer, etc.) electrically connected to the primary wireless device, and at least one secondary device (e.g., a scanner) adapted to communicate with the primary wireless device over a wireless link.
  • a primary wireless device e.g., a host
  • an output device e.g., a display, printer, etc.
  • at least one secondary device e.g., a scanner
  • the term “session” is used herein to connote a (static or dynamic) period of time.
  • the session may be user-defined, so that a new session begins, for example, every hour, every day, at the beginning of a shift, etc.
  • the session may alternately (or also) be based on the reception of user-defined data, so that a new session begins, for example, when an employee logs (or clocks) in, when a new (or different) wireless scanner is identified, when a “provisioning” key or icon is selected, etc.
  • the session may alternately (or also) be based on the occurrence of an event (e.g., power outage, security breach, etc.).
  • security data is used herein to connote any number, code or data that is used to enhance (or establish a level of) security in a wireless link.
  • PIN personal identification number
  • Similar (security) data is used in conjunction with other wireless protocols.
  • a host in a first embodiment, includes a provisioning application connected to a first wireless device and adapted to (i) generate security data at the beginning of a session, (ii) provide the security data to the first wireless device, and (iii) display the security data on a display.
  • the provisioning application is further adapted to (i) store the security data in a memory device, (ii) display instructional information on the display, and/or (iii) generate a barcode(s) that includes the security data, at least one provisioning command, and/or additional data.
  • a scanner in a second embodiment of the present invention, includes a scanning application connected to a second wireless device and adapted to (i) acquire encoded data (e.g., a barcode, etc.), (ii) extract the security data from the encoded data, (iii) identify the security data as being applicable to the second wireless device, and (iv) provide the security data to the second wireless device.
  • the scanning application is further adapted to store the security data in a memory device.
  • the scanning application may use the command(s) to identify the security data as being applicable to the second wireless device and/or the second wireless device may use the command(s) to identify the security data as being applicable to provisioning a wireless link (e.g., for authentication, encryption, etc.).
  • a wireless link e.g., for authentication, encryption, etc.
  • the scanning application is further adapted to acquire additional encoded data from a third device (e.g., printer, etc.) and provide the additional data to the host over a secure wireless link.
  • the additional encoded data is used by the host to establish a connection with the third device.
  • FIG. 1 illustrates a system for provisioning a wireless link between a host and a scanner in accordance with one embodiment of the present invention
  • FIG. 2 illustrates a block diagram of a host and a block diagram of a scanner (see FIG. 1 ) in accordance with embodiments of the present invention
  • FIG. 3 illustrates a method of provisioning a wireless link in accordance with one embodiment of the present invention.
  • the present invention provides a system and method of provisioning a wireless link for a wireless scanner.
  • like element numerals are used to describe like elements illustrated in one or more figures.
  • the present invention is not so limited, and is further applicable to all wireless protocols including, but not limited to, WiFi, WLAN, ZigBee, and all other wireless protocols generally known to those skilled in the art.
  • Embodiments of the present invention operate in accordance with an output device (e.g., display, printer, etc.), a primary wireless device (e.g., a host) connected to the output device, and at least one secondary wireless device (e.g., a scanner).
  • FIG. 1 illustrates a system for provisioning a wireless link in accordance with one embodiment of the present invention.
  • the system 10 includes a host 100 , a display 110 electrically connected to the host 100 , and a scanner 120 adapted to communicate with the host 100 over a wireless link.
  • the displays discussed and depicted herein include, but are not limited to, computer monitors (e.g., CRTs, flat-panels, etc.), small graphic displays (e.g., 240 ⁇ 320, etc.), alphanumeric displays, and all other display devices generally known to those skilled in the art.
  • the hosts discussed and depicted herein include, but are not limited to, personal computers (desktops, laptops, etc.), hand-held computers (e.g., PDAs, etc.) and all other computing and/or processing devices generally known to those skilled in the art.
  • the wireless scanners discussed and depicted herein include, but are not limited to, wireless barcode scanners, wireless RFID scanners, and all other wireless optical, electrical and/or radio frequency scanning devices generally known to those skilled in the art.
  • the host 100 is adapted to generate security data at the beginning of a session.
  • the term “session” is used herein to connote a (static or dynamic) period of time.
  • the session may be user-defined, so that a new session begins, for example, every hour, every day, at the beginning of a shift, etc.
  • the session may alternately (or also) be based on the reception of user-defined data, so that a new session begins, for example, when an employee logs (or clocks) in, when a new (or different) wireless scanner is identified, when a “provisioning” key or icon is selected, etc.
  • the session may alternately (or also) be based on the occurrence of an event (e.g., power outage, security breach, etc.).
  • security data is used herein to connote any number, code or data that is used to enhance (or establish a level of) security in a wireless link.
  • PIN personal identification number
  • Similar (security) data is used in conjunction with other wireless protocols.
  • the security data is then displayed on the display 110 .
  • the security data is displayed in the form of at least one barcode.
  • the host 100 in this embodiment, is adapted to (i) generate security data, (ii) generate at least one barcode that includes at least the security data, and (iii) display the at least one barcode on the display 110 .
  • the host 100 is further adapted to generate a barcode(s) that includes both the security data and at least one provisioning command.
  • the provisioning command is used by the scanner 120 (or components included therein) to identify the security data as data that is applicable to a wireless device or can be used to provision a wireless link.
  • the host 100 is further adapted to display instructional information on the display.
  • the display 110 includes instructional information (e.g., “Provisioning Procedures 1 ) Scan barcode 1 . . . ”) and a plurality of barcodes (e.g., barcodes 1 and 2 ) (i.e., 112 ).
  • the barcodes include security data and may also include at least one provisioning command and/or additional information.
  • the wireless device 120 is then used to scan an image of the barcode(s) on the display 110 .
  • the security data is then extracted from the barcode(s) and used to provision a wireless link between the scanner 120 and the host 100 .
  • the security data e.g., a PIN
  • the security data may be used to generate a “response” to a “challenge” transmitted by the host 100 . It may also be used to facilitate encryption.
  • FIG. 2 illustrates a block diagram of the host and a block diagram of the scanner in accordance with embodiments of the present invention.
  • the host includes a first wireless device 102 , a provisioning application 104 and a memory device 106 .
  • the provisioning application 104 is adapted to (i) generate security data at the beginning of a session, (ii) provide the security data to the first wireless device 102 , and (iii) display the security data on the display 110 .
  • the provisioning application is further adapted to (i) store the security data in the memory device 106 , (ii) display instructional information on the display 110 , and/or (iii) generate a barcode(s) that includes the security data, at least one provisioning command, and/or additional data.
  • the scanner 120 includes a second wireless device 122 , a scanning application 124 and a memory device 120 .
  • the scanning application 124 is adapted to (i) acquire barcode data, (ii) extract (e.g., decode) the security data from the barcode data, (iii) identify the security data as being applicable to the second wireless device, and (iii) provide the security data to the second wireless device.
  • the scanning application 124 is further adapted to store the security data in the memory device 126 .
  • the scanning application 124 may use the command(s) to identify the security data as being applicable to the second wireless device 122 and/or the second wireless device 122 may use the command(s) to identify the security data as being applicable to provisioning a wireless link (e.g., for authentication, encryption, etc.).
  • a wireless link e.g., for authentication, encryption, etc.
  • additional security data is used to provision a wireless link between the host 100 and a third device (e.g., computer, smart printer, etc.).
  • the third device 300 includes a third wireless device 302 , a second provisioning application 304 and a memory 306 .
  • the provisioning application 304 is adapted to (i) generate additional security data (e.g., at the beginning of a session, etc.), (ii) provide the additional security data to the third wireless device 302 , and (iii) display or print the additional security data.
  • the second provisioning application 304 is further adapted to (i) store the additional security data in the memory device 306 , (ii) display or print instructional information, and/or (iii) generate a barcode(s) that includes the additional security data, at least one provisioning command, and/or additional data.
  • the scanner application 124 is further adapted to (i) acquire the additional security data (e.g., by scanning a barcode that includes the additional security data, etc.) and (ii) provide the additional security data to the second wireless device 122 .
  • the second wireless device 122 is then adapted to provide the additional security data to the first wireless device 102 via the wireless link 200 .
  • the additional security data is then used to provision a wireless link 400 between the first wireless device 102 and the third wireless device 302 .
  • the scanning application 124 may use the command(s) to identify the additional security data as being applicable to the second wireless device 122 , the second wireless device 122 may use the command(s) to identify the additional security data as being applicable to the first wireless device 102 , and/or the first wireless device 102 may use the command(s) to identify the additional security data as being applicable to provisioning a wireless link (e.g., for authentication, encryption, etc.).
  • a wireless link e.g., for authentication, encryption, etc.
  • the wireless devices include, but are not limited to, Bluetooth transceivers and all other wireless reception and/or transmission devices generally known to those skilled in the art.
  • the memory devices e.g., 106 , 126 depicted and discussed herein include, but are not limited to, RAM, cache memory, flash memory, magnetic disks, optical disks, removable disks, SCSI disks, IDE hard drives, registers and all other data storage devices (and combinations thereof, such as RAID devices) generally known to those skilled in the art. It should further be appreciated that the number, locations and types of components depicted in FIG.
  • a host that includes additional or fewer components (e.g., a plurality of memory devices, a user interface, etc.) is considered within the spirit and scope of the present invention.
  • the provisioning application may exist as a single application or as multiple applications operating locally on and/or remotely to the host.
  • a provisioning system that includes a host, a server in communication with the host, and at least a portion of a provisioning application operating on the server, is considered within the spirit and scope of the present invention.
  • a session (e.g., a first session, etc.) is identified at step 400 .
  • a session may begin at a pre-determined time, in response to the reception of user-defined data (e.g., data indicating that a new (or different) scanner is being use, data indicating that a “provisioning” key or icon has been selected, etc.), and/or in response to a particular event.
  • user-defined data e.g., data indicating that a new (or different) scanner is being use, data indicating that a “provisioning” key or icon has been selected, etc.
  • security data is automatically generated.
  • the security data is generated at the beginning of or during the session.
  • the security data is provided to a first wireless device and displayed on a display device.
  • the first wireless device may use the security data to perform at least one security procedure (e.g., generate and transmit a “challenge,” etc.).
  • the security data is encoded (e.g., in a barcode, etc.) prior to being displayed on the display device.
  • An image of the security data (or an encoded version thereof) is then scanned at step 408 and used to establish a wireless connection between the first wireless device and a second wireless device at step 410 .
  • the second wireless device may use the security data to perform at least one security procedure (e.g., generate and transmit a “response” to the “challenge,” etc.).
  • the wireless link can then be used to exchange data at step 412 until the session has expired or a new session has begun.
  • security data e.g., new security data
  • security data is automatically generated at step 402 , and the process begins again.
  • FIG. 5 A method of provisioning a wireless link in accordance with a second embodiment of the present invention is illustrated in FIG. 5 .
  • additional security data is automatically generated at step 500 and provided to a third wireless device at step 502 .
  • the additional security data is then displayed or printed (e.g., on a display, by a printer, by a smart printer, etc.).
  • An image of the additional security data, as displayed or printed, is then scanned at step 506 and provided to a second wireless device at step 508 .
  • the additional security data is provided to a first wireless device via a first wireless link (e.g., between the first wireless device and the second wireless device) and used to provision a second wireless link (e.g., between the first wireless device and the third wireless device).
  • a first wireless link e.g., between the first wireless device and the second wireless device
  • a second wireless link e.g., between the first wireless device and the third wireless device

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Electromagnetism (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Toxicology (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A system and method of provisioning a wireless link for a wireless scanner is provided. Embodiments of the present invention operate in accordance with a primary wireless device adapted to generate security data at the beginning of a session, an output device electrically connected to the primary wireless device, and a secondary wireless device adapted to communicate with the primary wireless device over a wireless link. In one embodiment of the present invention, the primary wireless device includes a provisioning application connected to a first wireless device and adapted to (i) generate security data at the beginning of a session, (ii) provide the security data to the first wireless device, and (iiii) provide the security data to the output device. In alternate embodiments of the present invention, the provisioning application is further adapted to (i) store the security data in a memory device, (ii) provide instructional information to the output device, and/or (ii) generate a barcode(s) that includes the security data, at least one provisioning command, and/or additional data. In another embodiment of the present invention, the second wireless device includes a scanning application connected to a second wireless device and adapted to (i) acquire the security data from the output device, (ii) identify the security data as being applicable to the second wireless device, and (iii) provide the security data to the second wireless device. In an alternate embodiment of the present invention, the scanning application is further adapted to store the security data in a memory device.

Description

    BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention relates to wireless scanning devices, and more particularly, to a system or method of provisioning a wireless link for a wireless scanner by automatically generating security data at the beginning of a session, providing security data to an output device, scanning the security data, and using the security data to establish a (preferably secure) wireless connection between the wireless scanner and a host.
  • 2. Description of Related Art
  • Wireless technology is becoming more and more prevalent. One concern with wireless technology, however, is the security of the information that is being transmitted. This is because the information is being transmitted over radio frequency (RF) signals that are accessible to anyone with a proper reception device. In response to this concern, many wireless protocols (e.g., Bluetooth, ZigBee, WLAN, etc.) have implemented security procedures that can be activated on command.
  • Bluetooth, for example, uses a personal identification number (PIN) to authenticate a secondary device. Specifically, the PIN of a primary device is manually provided to the secondary device (e.g., by way of a keyboard). The primary device then transmits a “challenge” that is based (in part) on the PIN. The secondary device then transmits a “response” that is based (in part) on the “challenge” and the PIN. If the “response” is proper (or authenticated), the secondary device is authenticated, and a relatively secure wireless link is established. If additional security is required, the PIN can be used to generate an encryption key, which is used to encrypt (or encode) data that is transmitted over the link. Similar security procedures are found in other wireless protocols.
  • One drawback of these security procedures is that they are based on PINs (or codes), which like any other password, should be changed frequently in order to ensure a certain level of security. Thus, a procedure needs to be in place in which new PINs are identified on a routine basis.
  • Another drawback, which only exacerbates the first drawback, is that the new PINs need to be entered manually (e.g., by way of a keyboard). This is especially problematic in a manufacturing or shipping environment, where wireless devices (e.g., wireless scanners, etc.) are used in numbers and frequently (if not continuously). If the security procedures, which require individuals to frequently (i) identify a number of new PINs and (ii) manually entering the new PINs into a number of wireless devices, becomes too cumbersome, the procedures will either be disregarded or they will be followed haphazardly. For example, the PINs may end up being relatively simple (e.g., “0000,” “123456”), repetitive, identified and entered less frequently, or never changed.
  • Accordingly, it would be desirable to provide a system and method of provisioning a wireless link between a host and a wireless device, preferably a wireless scanner, that overcomes at least one of these drawbacks.
  • SUMMARY OF THE INVENTION
  • The present invention provides a system and method of provisioning a wireless link for a wireless scanner. Embodiments of the present invention operate in accordance a primary wireless device (e.g., a host) adapted to generate security data at the beginning of a session, an output device (e.g., a display, printer, etc.) electrically connected to the primary wireless device, and at least one secondary device (e.g., a scanner) adapted to communicate with the primary wireless device over a wireless link.
  • The term “session” is used herein to connote a (static or dynamic) period of time. The session may be user-defined, so that a new session begins, for example, every hour, every day, at the beginning of a shift, etc. The session may alternately (or also) be based on the reception of user-defined data, so that a new session begins, for example, when an employee logs (or clocks) in, when a new (or different) wireless scanner is identified, when a “provisioning” key or icon is selected, etc. The session may alternately (or also) be based on the occurrence of an event (e.g., power outage, security breach, etc.). The term “security data” is used herein to connote any number, code or data that is used to enhance (or establish a level of) security in a wireless link. For example, with respect to the Bluetooth protocol, a personal identification number (PIN) is used for authentication and encryption, and would therefore constitute security data. Similar (security) data is used in conjunction with other wireless protocols.
  • In a first embodiment of the present invention, a host includes a provisioning application connected to a first wireless device and adapted to (i) generate security data at the beginning of a session, (ii) provide the security data to the first wireless device, and (iii) display the security data on a display. In alternate embodiments of the present invention, the provisioning application is further adapted to (i) store the security data in a memory device, (ii) display instructional information on the display, and/or (iii) generate a barcode(s) that includes the security data, at least one provisioning command, and/or additional data.
  • In a second embodiment of the present invention, a scanner includes a scanning application connected to a second wireless device and adapted to (i) acquire encoded data (e.g., a barcode, etc.), (ii) extract the security data from the encoded data, (iii) identify the security data as being applicable to the second wireless device, and (iv) provide the security data to the second wireless device. In an alternate embodiment of the present invention, the scanning application is further adapted to store the security data in a memory device. If the barcode(s) includes a provisioning command(s), the scanning application may use the command(s) to identify the security data as being applicable to the second wireless device and/or the second wireless device may use the command(s) to identify the security data as being applicable to provisioning a wireless link (e.g., for authentication, encryption, etc.).
  • In a third embodiment of the present invention, the scanning application is further adapted to acquire additional encoded data from a third device (e.g., printer, etc.) and provide the additional data to the host over a secure wireless link. In one embodiment of the present invention, the additional encoded data is used by the host to establish a connection with the third device.
  • A more complete understanding of a system and method of provisioning a wireless link for a wireless scanner will be afforded to those skilled in the art, as well as a realization of additional advantages and objects thereof, by a consideration of the following detailed description of the preferred embodiment. Reference will be made to the appended sheets of drawings which will first be described briefly.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 illustrates a system for provisioning a wireless link between a host and a scanner in accordance with one embodiment of the present invention;
  • FIG. 2 illustrates a block diagram of a host and a block diagram of a scanner (see FIG. 1) in accordance with embodiments of the present invention; and
  • FIG. 3 illustrates a method of provisioning a wireless link in accordance with one embodiment of the present invention.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
  • The present invention provides a system and method of provisioning a wireless link for a wireless scanner. In the detailed description that follows, like element numerals are used to describe like elements illustrated in one or more figures. It should be appreciated that while embodiments of the present invention are described herein in term of a Bluetooth protocol, the present invention is not so limited, and is further applicable to all wireless protocols including, but not limited to, WiFi, WLAN, ZigBee, and all other wireless protocols generally known to those skilled in the art.
  • Embodiments of the present invention operate in accordance with an output device (e.g., display, printer, etc.), a primary wireless device (e.g., a host) connected to the output device, and at least one secondary wireless device (e.g., a scanner). FIG. 1 illustrates a system for provisioning a wireless link in accordance with one embodiment of the present invention. Specifically, the system 10 includes a host 100, a display 110 electrically connected to the host 100, and a scanner 120 adapted to communicate with the host 100 over a wireless link. It should be appreciated that the displays discussed and depicted herein include, but are not limited to, computer monitors (e.g., CRTs, flat-panels, etc.), small graphic displays (e.g., 240×320, etc.), alphanumeric displays, and all other display devices generally known to those skilled in the art. It should also be appreciated that the hosts discussed and depicted herein include, but are not limited to, personal computers (desktops, laptops, etc.), hand-held computers (e.g., PDAs, etc.) and all other computing and/or processing devices generally known to those skilled in the art. It should further be appreciated that the wireless scanners discussed and depicted herein include, but are not limited to, wireless barcode scanners, wireless RFID scanners, and all other wireless optical, electrical and/or radio frequency scanning devices generally known to those skilled in the art.
  • In accordance with a first embodiment of the present invention, the host 100 is adapted to generate security data at the beginning of a session. The term “session” is used herein to connote a (static or dynamic) period of time. The session may be user-defined, so that a new session begins, for example, every hour, every day, at the beginning of a shift, etc. The session may alternately (or also) be based on the reception of user-defined data, so that a new session begins, for example, when an employee logs (or clocks) in, when a new (or different) wireless scanner is identified, when a “provisioning” key or icon is selected, etc. The session may alternately (or also) be based on the occurrence of an event (e.g., power outage, security breach, etc.). The term “security data” is used herein to connote any number, code or data that is used to enhance (or establish a level of) security in a wireless link. For example, with respect to the Bluetooth protocol, a personal identification number (PIN) is used for authentication and encryption, and therefore constitute security data. Similar (security) data is used in conjunction with other wireless protocols.
  • The security data is then displayed on the display 110. In a preferred embodiment of the present invention, the security data is displayed in the form of at least one barcode. In other words, the host 100, in this embodiment, is adapted to (i) generate security data, (ii) generate at least one barcode that includes at least the security data, and (iii) display the at least one barcode on the display 110. In another embodiment of the present invention, the host 100 is further adapted to generate a barcode(s) that includes both the security data and at least one provisioning command. The provisioning command is used by the scanner 120 (or components included therein) to identify the security data as data that is applicable to a wireless device or can be used to provision a wireless link. In another embodiment of the present invention, the host 100 is further adapted to display instructional information on the display. Such an embodiment is exemplified in FIG. 1, where the display 110 includes instructional information (e.g., “Provisioning Procedures 1) Scan barcode 1 . . . ”) and a plurality of barcodes (e.g., barcodes 1 and 2) (i.e., 112). The barcodes include security data and may also include at least one provisioning command and/or additional information.
  • The wireless device 120 is then used to scan an image of the barcode(s) on the display 110. The security data is then extracted from the barcode(s) and used to provision a wireless link between the scanner 120 and the host 100. For example, if the scanner 120 includes Bluetooth technology, the security data (e.g., a PIN) may be used to generate a “response” to a “challenge” transmitted by the host 100. It may also be used to facilitate encryption.
  • FIG. 2 illustrates a block diagram of the host and a block diagram of the scanner in accordance with embodiments of the present invention. Specifically, in accordance with one embodiment of the present invention, the host includes a first wireless device 102, a provisioning application 104 and a memory device 106. The provisioning application 104 is adapted to (i) generate security data at the beginning of a session, (ii) provide the security data to the first wireless device 102, and (iii) display the security data on the display 110. In alternate embodiments of the present invention, the provisioning application is further adapted to (i) store the security data in the memory device 106, (ii) display instructional information on the display 110, and/or (iii) generate a barcode(s) that includes the security data, at least one provisioning command, and/or additional data.
  • In accordance with another embodiment of the present invention, the scanner 120 includes a second wireless device 122, a scanning application 124 and a memory device 120. The scanning application 124 is adapted to (i) acquire barcode data, (ii) extract (e.g., decode) the security data from the barcode data, (iii) identify the security data as being applicable to the second wireless device, and (iii) provide the security data to the second wireless device. In an alternate embodiment of the present invention, the scanning application 124 is further adapted to store the security data in the memory device 126. If a provisioning command(s) is provided, the scanning application 124 may use the command(s) to identify the security data as being applicable to the second wireless device 122 and/or the second wireless device 122 may use the command(s) to identify the security data as being applicable to provisioning a wireless link (e.g., for authentication, encryption, etc.).
  • In accordance with another embodiment of the present invention, as shown in FIG. 3, additional security data is used to provision a wireless link between the host 100 and a third device (e.g., computer, smart printer, etc.). Specifically, the third device 300 includes a third wireless device 302, a second provisioning application 304 and a memory 306. The provisioning application 304 is adapted to (i) generate additional security data (e.g., at the beginning of a session, etc.), (ii) provide the additional security data to the third wireless device 302, and (iii) display or print the additional security data. In an alternate embodiment of the present invention, the second provisioning application 304 is further adapted to (i) store the additional security data in the memory device 306, (ii) display or print instructional information, and/or (iii) generate a barcode(s) that includes the additional security data, at least one provisioning command, and/or additional data.
  • The scanner application 124, in accordance with this embodiment, is further adapted to (i) acquire the additional security data (e.g., by scanning a barcode that includes the additional security data, etc.) and (ii) provide the additional security data to the second wireless device 122. The second wireless device 122 is then adapted to provide the additional security data to the first wireless device 102 via the wireless link 200. The additional security data is then used to provision a wireless link 400 between the first wireless device 102 and the third wireless device 302. If a provisioning command(s) is provided, the scanning application 124 may use the command(s) to identify the additional security data as being applicable to the second wireless device 122, the second wireless device 122 may use the command(s) to identify the additional security data as being applicable to the first wireless device 102, and/or the first wireless device 102 may use the command(s) to identify the additional security data as being applicable to provisioning a wireless link (e.g., for authentication, encryption, etc.).
  • It should be appreciated that the wireless devices (e.g., 102, 122) depicted and discussed herein include, but are not limited to, Bluetooth transceivers and all other wireless reception and/or transmission devices generally known to those skilled in the art. It should also be appreciated that the memory devices (e.g., 106, 126) depicted and discussed herein include, but are not limited to, RAM, cache memory, flash memory, magnetic disks, optical disks, removable disks, SCSI disks, IDE hard drives, registers and all other data storage devices (and combinations thereof, such as RAID devices) generally known to those skilled in the art. It should further be appreciated that the number, locations and types of components depicted in FIG. 2 are not limitations of the present invention, and are merely provided to illustrate the environment in which the present invention may operate. Thus, for example, a host that includes additional or fewer components (e.g., a plurality of memory devices, a user interface, etc.) is considered within the spirit and scope of the present invention. It should further be appreciated that the provisioning application may exist as a single application or as multiple applications operating locally on and/or remotely to the host. Thus, for example, a provisioning system that includes a host, a server in communication with the host, and at least a portion of a provisioning application operating on the server, is considered within the spirit and scope of the present invention.
  • A method of provisioning a wireless link in accordance with one embodiment of the present invention is illustrated in FIG. 4. Specifically, a session (e.g., a first session, etc.) is identified at step 400. As previously discussed, a session may begin at a pre-determined time, in response to the reception of user-defined data (e.g., data indicating that a new (or different) scanner is being use, data indicating that a “provisioning” key or icon has been selected, etc.), and/or in response to a particular event. At step 402, security data is automatically generated. In preferred embodiments of the present invention, the security data is generated at the beginning of or during the session. At steps 404 and 406, respectively, the security data is provided to a first wireless device and displayed on a display device. The first wireless device may use the security data to perform at least one security procedure (e.g., generate and transmit a “challenge,” etc.). In one embodiment of the present invention, the security data is encoded (e.g., in a barcode, etc.) prior to being displayed on the display device.
  • An image of the security data (or an encoded version thereof) is then scanned at step 408 and used to establish a wireless connection between the first wireless device and a second wireless device at step 410. For example, the second wireless device may use the security data to perform at least one security procedure (e.g., generate and transmit a “response” to the “challenge,” etc.). The wireless link can then be used to exchange data at step 412 until the session has expired or a new session has begun. At step 414, and at that time, security data (e.g., new security data) is automatically generated at step 402, and the process begins again.
  • A method of provisioning a wireless link in accordance with a second embodiment of the present invention is illustrated in FIG. 5. Specifically, additional security data is automatically generated at step 500 and provided to a third wireless device at step 502. At step 504, the additional security data is then displayed or printed (e.g., on a display, by a printer, by a smart printer, etc.). An image of the additional security data, as displayed or printed, is then scanned at step 506 and provided to a second wireless device at step 508. At steps 510 and 512, respectively, the additional security data is provided to a first wireless device via a first wireless link (e.g., between the first wireless device and the second wireless device) and used to provision a second wireless link (e.g., between the first wireless device and the third wireless device).
  • Having thus described several embodiments of a system and method of provisioning a secure wireless link for a wireless scanner, it should be apparent to those skilled in the art that certain advantages of the within described system and method have been achieved. It should also be appreciated that various modifications, adaptations, and alternative embodiments thereof may be made within the scope and spirit of the present invention. The invention is solely defined by the following claims.

Claims (23)

1. A system for provisioning a wireless connection between a host and a scanner, comprising:
a display device;
a host connected to said display device and comprising a first wireless device and a provisioning application, said provisioning application being adapted to:
automatically generate security data at the beginning of a session;
provide said security data to said first wireless device; and
display said security data on said display device; and
a scanner comprising a second wireless device and a scanning application, said scanning application being adapted to:
scan an image of said security data on said display device; and
provide said security data to said second wireless device, said security data being used by said first and second wireless devices to establish a secure wireless connection therebetween.
2. The system of claim 1, wherein said host further comprises a memory device and said provisioning application is further adapted to store said security data in said memory device.
3. The system of claim 1, wherein said first and second wireless devices are Bluetooth transceivers and said security data comprises a personal identification number (PIN).
4. The system of claim 1, wherein said session comprises a user-defined period of time.
5. The system of claim 1, wherein said provisioning application is further adapted to create said session in response to receiving user-defined data.
6. The system of claim 1, wherein said provisioning application is further adapted to generate at least one barcode that includes said security data and to display said security data on said display device by displaying said at least one barcode on said display device.
7. The system of claim 3, wherein said provisioning application is further adapted to display at least one provisioning command on said display device, an image of said at least one provisioning command being scanned by said scanner and used to identify said security data as said PIN.
8. The system of claim 7, wherein said provisioning application is further adapted to display instructional information on said display device, said instructional information instructing a user to scan said image of said security data on said display device.
9. The system of claim 1, wherein said scanner further comprises a memory device, said scanning application being further adapted to store said security data in said memory device.
10. The system of claim 1, wherein said security data is used by said first wireless device to authenticate said second wireless device.
11. The system of claim 1, wherein said security data is used to encrypt data that is transmitted at least unidirectionally over said secure wireless connection.
12. The system of claim 1, further comprising a third wireless device and a second provisioning application adapted to (i) automatically generate additional security data, (ii) provide said additional security data to said third wireless device, and (iii) print said additional security data.
13. The system of claim 13, wherein said scanning application is further adapted to scan an image of said additional security data and provide said additional security data to said second wireless device, said additional security data being provided to said first wireless device via said secure wireless connection and used to establish a second wireless connection between said first wireless device and said third wireless device.
14. A method of provisioning a wireless connection between a host and a scanner, comprising:
automatically generating security data that corresponds to a session;
providing said security data to a first wireless device, said first wireless device being in communication with said host;
displaying said security data on a display device;
acquiring said security data by scanning an image of said security data on said display device;
identifying said security data as being applicable to a second wireless device, said second wireless device being in communication with said scanner;
providing said security data to said second wireless device; and
using said security data to establish a secure wireless connection between said first and second wireless devices.
15. The method of claim 14, wherein said step of automatically generating security data further comprises automatically generating a personal identification number (PIN), said PIN being used, at least in part, by said first wireless device to authenticate said second wireless device.
16. The method of claim 14, wherein said step of automatically generating security data further comprises automatically generating a personal identification number (PIN), said PIN being use, at least in part, to encrypt data that is transmitted at least unidirectionally over said secure wireless connection.
17. The method of claim 14, wherein said step of automatically generating security data that corresponds to a session further comprises automatically generating said security data that corresponds to a user-defined session.
18. The method of claim 14, further comprising the step of receiving user-defined data, wherein said step of automatically generating security data that corresponds to a session further comprises automatically generating said security data that corresponds to the reception of said user-defined data.
19. The method of claim 14, wherein said step of displaying said security data on a display device further comprises generating at least one barcode that includes said security data and displaying said at least one barcode on said display device.
20. The method of claim 14, wherein said steps of displaying said security data on a display device and identifying said security data as being applicable to a second wireless device further comprises:
generating at least one barcode that includes said security data and at least one provisioning command;
displaying said at least one barcode on said display device; and
using said at least one provisioning command to identify said security data as being applicable to said second wireless device.
21. The method of claim 20, wherein said step of displaying said security data on a display device further comprises displaying instructional information on said display device that instructs a user to scan an image of said at least one barcode on said display device.
22. The method of claim 14, further comprising:
automatically generating additional security data;
providing said additional security data to a third wireless device;
printing said additional security data on a substantially flat substrate;
acquiring said additional security by scanning an image of said additional security data on said substantially flat substrate;
providing said additional security data to said first wireless device via said secure wireless connection; and
using said additional security data to establish a second secure wireless connection between said first and third wireless devices.
23. A host connected to a display device, comprising:
a Bluetooth transceiver; and
a provisioning application connected to said Bluetooth transceiver, said provisioning application being adapted to:
automatically generate a personal identification number (PIN) at the beginning of a session;
providing said PIN to said Bluetooth transceiver, said Bluetooth transceiver using said PIN to generate a challenge;
generating at least one barcode that includes at least said PIN;
displaying said at least one barcode on said display device;
wherein said PIN is used by a scanner to generate a response to said challenge, which is then used by said Bluetooth transceiver to authenticate said scanner.
US11/266,828 2005-11-03 2005-11-03 Provisioning a wireless link for a wireless scanner Abandoned US20070101403A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/266,828 US20070101403A1 (en) 2005-11-03 2005-11-03 Provisioning a wireless link for a wireless scanner

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/266,828 US20070101403A1 (en) 2005-11-03 2005-11-03 Provisioning a wireless link for a wireless scanner

Publications (1)

Publication Number Publication Date
US20070101403A1 true US20070101403A1 (en) 2007-05-03

Family

ID=37998169

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/266,828 Abandoned US20070101403A1 (en) 2005-11-03 2005-11-03 Provisioning a wireless link for a wireless scanner

Country Status (1)

Country Link
US (1) US20070101403A1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100259549A1 (en) * 2009-04-08 2010-10-14 Research In Motion Limited Systems, devices, and methods for displaying a barcode at a computing device
US20110081860A1 (en) * 2009-10-02 2011-04-07 Research In Motion Limited Methods and devices for facilitating bluetooth pairing using a camera as a barcode scanner
US20110210171A1 (en) * 2010-02-26 2011-09-01 Research In Motion Limited Methods and devices for transmitting and receiving data used to activate a device to operate with a server
EP2364043A1 (en) 2010-02-26 2011-09-07 Research In Motion Limited Methods and devices for transmitting and receiving data used to activate a device to operate with a server
US20120084846A1 (en) * 2010-09-30 2012-04-05 Google Inc. Image-based key exchange
US20120322382A1 (en) * 2010-02-25 2012-12-20 Olympus Corporation Portable wireless terminal, wireless terminal device, and wireless communication system
US8463239B1 (en) * 2011-02-11 2013-06-11 Sprint Communications Company L.P. Secure reconfiguration of wireless communication devices
US20140366101A1 (en) * 2012-02-09 2014-12-11 Sharp Kabushiki Kaisha Informaton processing system, information processing device, and communication connection method
US20160314294A1 (en) * 2015-04-24 2016-10-27 Hand Held Products, Inc. Secure unattended network authentication
CN108108595A (en) * 2017-12-29 2018-06-01 晨星半导体股份有限公司 The method and system authorized to the software in electronic equipment
BE1028540B1 (en) * 2020-08-27 2022-10-05 Zebra Technologies METHODS AND SYSTEMS FOR SETTING UP A BI-DIRECTIONAL COMMUNICATION LINK BETWEEN A HOST DEVICE AND A BARCODE READER

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030152041A1 (en) * 2002-01-10 2003-08-14 Falk Herrmann Protocol for reliable, self-organizing, low-power wireless network for security and building automation systems
US20050140498A1 (en) * 2000-12-11 2005-06-30 Bastian William A.Ii Inventory system with barcode display
US20050266826A1 (en) * 2004-06-01 2005-12-01 Nokia Corporation Method for establishing a security association between a wireless access point and a wireless node in a UPnP environment
US20060267753A1 (en) * 2005-05-31 2006-11-30 Hussey Robert M Bar coded wristband

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050140498A1 (en) * 2000-12-11 2005-06-30 Bastian William A.Ii Inventory system with barcode display
US20030152041A1 (en) * 2002-01-10 2003-08-14 Falk Herrmann Protocol for reliable, self-organizing, low-power wireless network for security and building automation systems
US20050266826A1 (en) * 2004-06-01 2005-12-01 Nokia Corporation Method for establishing a security association between a wireless access point and a wireless node in a UPnP environment
US20060267753A1 (en) * 2005-05-31 2006-11-30 Hussey Robert M Bar coded wristband

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8720780B2 (en) 2009-04-08 2014-05-13 Blackberry Limited Systems, devices, and methods for displaying a barcode at a computing device
US9349088B2 (en) 2009-04-08 2016-05-24 Blackberry Limited Systems, devices, and methods for displaying a barcode at a computing device
US20100259549A1 (en) * 2009-04-08 2010-10-14 Research In Motion Limited Systems, devices, and methods for displaying a barcode at a computing device
US20110081860A1 (en) * 2009-10-02 2011-04-07 Research In Motion Limited Methods and devices for facilitating bluetooth pairing using a camera as a barcode scanner
US9185735B2 (en) 2009-10-02 2015-11-10 Blackberry Limited Methods and devices for facilitating bluetooth pairing using a camera as a barcode scanner
US8879994B2 (en) 2009-10-02 2014-11-04 Blackberry Limited Methods and devices for facilitating Bluetooth pairing using a camera as a barcode scanner
US20120322382A1 (en) * 2010-02-25 2012-12-20 Olympus Corporation Portable wireless terminal, wireless terminal device, and wireless communication system
EP2364043A1 (en) 2010-02-26 2011-09-07 Research In Motion Limited Methods and devices for transmitting and receiving data used to activate a device to operate with a server
US9105023B2 (en) * 2010-02-26 2015-08-11 Blackberry Limited Methods and devices for transmitting and receiving data used to activate a device to operate with a server
US20110210171A1 (en) * 2010-02-26 2011-09-01 Research In Motion Limited Methods and devices for transmitting and receiving data used to activate a device to operate with a server
US8855300B2 (en) * 2010-09-30 2014-10-07 Google Inc. Image-based key exchange
US8861724B2 (en) * 2010-09-30 2014-10-14 Google Inc. Image-based key exchange
US20120084571A1 (en) * 2010-09-30 2012-04-05 Google Inc. Image-based key exchange
US20120084846A1 (en) * 2010-09-30 2012-04-05 Google Inc. Image-based key exchange
US8463239B1 (en) * 2011-02-11 2013-06-11 Sprint Communications Company L.P. Secure reconfiguration of wireless communication devices
US20140366101A1 (en) * 2012-02-09 2014-12-11 Sharp Kabushiki Kaisha Informaton processing system, information processing device, and communication connection method
US10462127B2 (en) 2012-02-09 2019-10-29 Sharp Kabushiki Kaisha Information processing system, information processing device, and communication connection method
US20160314294A1 (en) * 2015-04-24 2016-10-27 Hand Held Products, Inc. Secure unattended network authentication
US20180101675A1 (en) * 2015-04-24 2018-04-12 Hand Held Products, Inc. Secure unattended network authentication
US10860706B2 (en) * 2015-04-24 2020-12-08 Hand Held Products, Inc. Secure unattended network authentication
CN108108595A (en) * 2017-12-29 2018-06-01 晨星半导体股份有限公司 The method and system authorized to the software in electronic equipment
US10949506B2 (en) * 2017-12-29 2021-03-16 Xiamen Sigmastar Technology Ltd. Method and system for authorizing software in electronic device
CN108108595B (en) * 2017-12-29 2023-03-28 星宸科技股份有限公司 Method and system for authorizing software in electronic equipment
BE1028540B1 (en) * 2020-08-27 2022-10-05 Zebra Technologies METHODS AND SYSTEMS FOR SETTING UP A BI-DIRECTIONAL COMMUNICATION LINK BETWEEN A HOST DEVICE AND A BARCODE READER

Similar Documents

Publication Publication Date Title
US9013729B2 (en) Mobile terminal apparatus and mobile print application
US10033903B2 (en) Image forming apparatus supporting near field communication (NFC) function and method of setting an image job using NFC device
US8496180B2 (en) Managing mobile device interactions using barcodes
US9356882B2 (en) Streamlined system for the transmission of network resource data
US8108317B2 (en) System and method for restricting access to a terminal
US8711407B2 (en) Method for generating optical codes for a print-context
US20070101403A1 (en) Provisioning a wireless link for a wireless scanner
US10003971B2 (en) Compartmentalized multi-factor authentication for mobile devices
KR20150014316A (en) Image forming apparatus and near field communication (NFC) device supporting function of NFC and method for performing authentication thereof
EP2300950B1 (en) System and method for configuring a scanner
US20120194854A1 (en) Automatic printer setup system
US20160037347A1 (en) Method for granting a plurality of electronic communication devices access to a local area network
US7076238B2 (en) Wireless communication system exchanging encrypted data
US20200153980A1 (en) System and method using matrix barcode information to process documents
JP2007328663A (en) Image forming apparatus and control method thereof
US20100306840A1 (en) Document processing automated system and image forming apparatus
CN108319877B (en) Information reading terminal using coding of external token
US7823779B2 (en) Complimentary optical image and radio frequency signal processing
JP2010055522A (en) Authentication control device, authentication control method, and program
US20080031445A1 (en) Key Binding Method and Applications Capable of Dynamic Key Generation
US8249209B2 (en) Synchronous one-bit interface protocol or data structure
JP2003216915A (en) Information transmission equipment and information transmission method
US20240267729A1 (en) Pre-Authentication for Short-Range Wireless Communications with Peripheral Devices
CN108571236B (en) Intelligent authentication system and electronic key thereof
JP2006142503A (en) Image processor

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERMEC IP CORP., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KUBLER, JOSEPH J.;REEL/FRAME:017194/0800

Effective date: 20051023

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION